CVE-2020-26542

9.8 CRITICAL

📋 TL;DR

This vulnerability allows authentication bypass in MongoDB Simple LDAP plugin for Percona Server when using SimpleLDAP authentication with Microsoft Active Directory. Attackers can authenticate with blank passwords, gaining access at the level of the authenticating account. Affects systems using Percona Server with Simple LDAP plugin and Active Directory integration.

💻 Affected Systems

Products:
  • Percona Server with MongoDB Simple LDAP plugin
Versions: Through 2020-10-02
Operating Systems: All platforms running affected Percona Server
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when using SimpleLDAP authentication with Microsoft Active Directory; standard authentication methods are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full Active Directory domain compromise if high-privilege service accounts are vulnerable, leading to data exfiltration, lateral movement, and complete system takeover.

🟠

Likely Case

Unauthorized database access leading to data theft, modification, or deletion, potentially escalating to broader network access.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege, and monitoring are in place, though authentication bypass still occurs.

🌐 Internet-Facing: HIGH if vulnerable service is exposed to internet, as authentication bypass allows direct unauthorized access.
🏢 Internal Only: HIGH as internal attackers or compromised systems can exploit this to bypass authentication controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and minimal technical skill - simply sending blank password triggers the bypass.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Percona Distribution for MySQL PXC variant 8.0.20 and later updates

Vendor Advisory: https://www.percona.com/blog/2020/10/13/percona-distribution-for-mysql-pxc-variant-8-0-20-fixes-for-security-vulnerability-release-roundup-october-13-2020/

Restart Required: Yes

Instructions:

1. Update to Percona Distribution for MySQL PXC variant 8.0.20 or later. 2. Apply patches from Percona advisory. 3. Restart Percona Server services. 4. Verify authentication now rejects blank passwords.

🔧 Temporary Workarounds

Disable SimpleLDAP Authentication

all

Temporarily disable SimpleLDAP authentication until patching is complete

Modify Percona Server configuration to use alternative authentication methods
Comment out or remove SimpleLDAP configuration lines

Implement Network Controls

all

Restrict access to Percona Server to only trusted networks and systems

Configure firewall rules to limit Percona Server port access
Implement network segmentation

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems
  • Enable detailed authentication logging and monitor for blank password attempts

🔍 How to Verify

Check if Vulnerable:

Test authentication with blank password against SimpleLDAP configuration; if successful, system is vulnerable.

Check Version:

mysql --version or check Percona Server version in configuration/management interface

Verify Fix Applied:

Attempt authentication with blank password; should be rejected after patch.

📡 Detection & Monitoring

Log Indicators:

  • Authentication attempts with blank/empty passwords in Percona Server logs
  • Successful logins from unexpected sources

Network Indicators:

  • Authentication traffic to Percona Server with minimal payload size
  • Unusual database access patterns

SIEM Query:

source="percona_logs" AND (password="" OR auth_failure="blank_password")

🔗 References

📤 Share & Export